Financial fraud of all types is a huge problem throughout the world. With the advent of automated teller machines, or ATMs, came another opportunity for would-be thieves to steal money, account information, and identities. The term "ATM fraud" can refer to an illegal transaction that is committed by using an ATM, including fraudulent deposits or skimming card information.

Most financial institutions have made depositing checks, or cash, as easy as withdrawing funds at an ATM. Most financial institutions also operate on the assumption that the person making the deposit is being honest and is actually depositing a valid check or cash. As a result, most ATMs credit the account holder at least a portion of the deposit immediately upon completion of the transaction. This can make ATM fraud very easy for someone who deposits an empty envelope and then withdraws money from the account. Of course, the amount that can be withdrawn using this type of ATM fraud is limited, and tracing the transaction is fairly easy, making fraudulent deposits less of a concern than other types of ATM fraud.

Ad

Of much larger concern to financial institutions and cardholders are the various forms of ATM fraud committed by stealing or skimming a cardholder's information when he or she uses the ATM. Stealing a cardholder's information may be accomplished in a number of ways. A criminal may implant a device on the ATM that causes the card to appear to be stuck in the machine only to be retrieved minutes later by the thief when the cardholder gets frustrated and leaves the area. The thief may then simply begin another transaction with the card and withdraw money from the account.

Criminals have also been known to use cameras positioned nearby an ATM machine that read the card information and record the pin number when entered by the cardholder. A clone, or duplicate, of the card is then made and used by the thief to make purchases or withdraw funds. This type of ATM fraud, however, has largely been replaced by more high tech gadgets known as card "skimmers."

A card skimmer is a device placed on the ATM that is unrecognizable by most users of the machine. The device actually reads and records the card information, as well as the pin number entered by the cardholder, in some cases. The thief simply returns to the ATM at a later time and removes the device and then uses the information gathered to make clone cards.

Discuss this Article

anon353572Post 4

While ATM fraud is a huge issue in the United States, steps are being taken to reduce it. By 2018, all ATMs in the US will be EMV capable. That means the ATMs will have a computer chip reader to read a chip embedded in the ATM card itself. As an operator of ATMs in the US and Canada, we have already implemented this program on all of our ATMs, and expect to have all of our US ATMs completed shortly.

With EMV, fraud is severely reduced in the US, as it is in the rest of the world.

anon288649Post 3

Very interesting article, especially in light of the EU report of the meteoric rise of ATM fraud.

However, this kind of fraud is a thing of the past, thanks to a novel authentication method, being implemented by two U.S banks, and one in Hong Kong.

Picture this scene:

Your ATM card is stolen, and on the back you have written your PIN number.

Together with this, they stole the piece of paper on which you wrote your online banking user ID and password.

To make things worse, a spy camera watched your last access and a keylogger also recorded each keystroke, and so did a network snooper.

Ordinarily, this would not be a good situation. However, if your bank is incorporating a particular authentication method, there is no way the thieves can access your accounts.

anon192258Post 2

I can really confirm the post of rebeca.

RebecaPost 1

There is another threat to ATMs that financial institutions must take into account: logical threats. An ATM is similar to a PC in many ways and therefore it is subject to hacker attacks. Because of this, it is important to have a complete security system for ATMs which takes into account every logical threat.

Post your comments

Please enter the code:

Login

Register

Make changes/additions/deletions to the article below, and one of our editors will publish your suggestions if warranted.

Optional: Explanation of your recommended changes

Thank You!

One of our editors will review your suggestion and make changes if warranted.
Note that depending on the number of suggestions we receive,
this can take anywhere from a few hours to a few days.
Thank you for helping to improve wiseGEEK!